Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
145s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20240419-en -
resource tags
arch:x64arch:x86image:win10v2004-20240419-enlocale:en-usos:windows10-2004-x64system -
submitted
05/05/2024, 09:00
Static task
static1
Behavioral task
behavioral1
Sample
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
Resource
win10v2004-20240419-en
General
-
Target
16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html
-
Size
2KB
-
MD5
16eec5101ca0ec6dc7f76590e146611c
-
SHA1
e592034e4e6a549ed1e1d53ac1e95f09f9b76ecd
-
SHA256
d9c4562143e0d2daa4ba5589b3630cc5b1e80d8c4d16dfe46c87aed00e3daf70
-
SHA512
a2640e2adbbc426c50829eb5b182d35c491563bf6ca1a73758ab097c3958e634b1560175d77277bc5811611aca8a8054ad5c9d913df2c9201a50c2893c6c5090
Malware Config
Signatures
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4708 msedge.exe 4708 msedge.exe 2368 msedge.exe 2368 msedge.exe 1912 identity_helper.exe 1912 identity_helper.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe 2336 msedge.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 6 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of FindShellTrayWindow 25 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe 2368 msedge.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2824 2368 msedge.exe 83 PID 2368 wrote to memory of 2824 2368 msedge.exe 83 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 3136 2368 msedge.exe 84 PID 2368 wrote to memory of 4708 2368 msedge.exe 85 PID 2368 wrote to memory of 4708 2368 msedge.exe 85 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86 PID 2368 wrote to memory of 3628 2368 msedge.exe 86
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument C:\Users\Admin\AppData\Local\Temp\16eec5101ca0ec6dc7f76590e146611c_JaffaCakes118.html1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffed93d46f8,0x7ffed93d4708,0x7ffed93d47182⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2092 /prefetch:22⤵PID:3136
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2196 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:4708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2840 /prefetch:82⤵PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3208 /prefetch:12⤵PID:696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3240 /prefetch:12⤵PID:4108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:82⤵PID:4268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=4140 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=4116 /prefetch:12⤵PID:4276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5316 /prefetch:12⤵PID:4064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=10 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5552 /prefetch:12⤵PID:4616
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5636 /prefetch:12⤵PID:2444
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2088,14557134799184995166,17565715582056636869,131072 --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=4318 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --gpu-preferences=UAAAAAAAAADoAAAQAAAAAAAAAAAAAAAAAABgAAAEAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1776 /prefetch:22⤵
- Suspicious behavior: EnumeratesProcesses
PID:2336
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:2264
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:4564
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152B
MD54e96ed67859d0bafd47d805a71041f49
SHA17806c54ae29a6c8d01dcbc78e5525ddde321b16b
SHA256bd13ddab4dc4bbf01ed50341953c9638f6d71faf92bc79fbfe93687432c2292d
SHA512432201c3119779d91d13da55a26d4ff4ce4a9529e00b44ec1738029f92610d4e6e25c05694adf949c3e9c70fbbbbea723f63c29287906729f5e88a046a2edcb7
-
Filesize
152B
MD51cbd0e9a14155b7f5d4f542d09a83153
SHA127a442a921921d69743a8e4b76ff0b66016c4b76
SHA256243d05d6af19bfe3e06b1f7507342ead88f9d87b84e239ad1d144e9e454b548c
SHA51217e5217d5bf67571afb0e7ef30ac21c11ea6553f89457548d96ee4461011f641a7872a37257239fa5f25702f027afb85d5bd9faf2f2f183992b8879407e56a0d
-
Filesize
185B
MD516e81634c717cb5947ed9aa070ddc2b7
SHA1022d7f21c91255339bc19c6da4bf31ab2ba0dab8
SHA2566f1a26fc5ffafc2290377b138faf803ebe1c9456aaba65232d89509fd750a29e
SHA512558affbcfc751a0b49af4aa9327b2cc8d1b51b1a9f1fe0591a70a1c7d29e5c8ed323d4db9bf804dcd4d2cc01eef27f0e4ec26cbdf7eb770ef11d98be213a924d
-
Filesize
5KB
MD5a96f3cbcd6e80eadbf36cfa8c5e70f45
SHA1dfed6144d0dc5fa09cd4ec817361f8627bdfadb0
SHA2564b801a574426db31877f2bc9e6a34d6e681aeae12b0ca1779ead4898bb259805
SHA51230d1af936060a3ce7ba60cb0e119b896705d17fa3b4b66783571475cc8d97a2e2cb65a09258da11e7411ba9f8ac5d8b2126a64bc13909d08f5f49cbb74def145
-
Filesize
6KB
MD570df28650b3757d536744687864ead29
SHA11dfe772db90b8a78a43276ef0ca1d855f8250447
SHA25670f1faccd8748d199b88f5bf4c479e59b48af356321d378958ad1e4ec7b7f2f1
SHA512bcd70abf71e49b7fbe627cae7be11e63e0fba41ff194befebca4ef820e9e960377cae2880423b4e209920ca88231af7aa02cd1ae5773f812b360fad257afac89
-
Filesize
16B
MD56752a1d65b201c13b62ea44016eb221f
SHA158ecf154d01a62233ed7fb494ace3c3d4ffce08b
SHA2560861415cada612ea5834d56e2cf1055d3e63979b69eb71d32ae9ae394d8306cd
SHA5129cfd838d3fb570b44fc3461623ab2296123404c6c8f576b0de0aabd9a6020840d4c9125eb679ed384170dbcaac2fa30dc7fa9ee5b77d6df7c344a0aa030e0389
-
Filesize
11KB
MD5542bc9920397f32a110b5c2272727792
SHA16333de685e7104daec6f7ceb4562a18d7c0dfcac
SHA256b6b1e26ac8999da5b21d2e68752ad4a86ea853a2f99186fc0ba9ae7ae4c83765
SHA5122d02e3e51269bd98352018565eb69321f71f0418a40c138d87410f6b494fdebfbd5b00f763989b30d34dfd99a776822c5a5d431b9ba228a8a045baadd24e162f